Info is scant, but such breaches can reveal where a security product’s controls are located and how detections are designed, giving attackers a leg up.
Yet Another Way to Bypass Google Chrome’s Encryption Protection
Authors of the VoidStealer Trojan uncovered a way to get around Google’s App-Bound Encryption (ABE), opening the door to infostealers.




